contact us

Comments

Popular posts from this blog

FOUNDATIONS OF CYBERSECURITY GOOGLE(COURSERA) QUIZ ANSWERS

BITFLIPING

HOW TO BYPASS THE 2FA(TWO FACTOR AUTHENTICATION)

AUTOMATED SCRIPT FOR FINDING XSS

PlayItSafe google cyber security professional course 2 (COURSERA)

The article explores the technique of remote server control through reverse shells employed by hackers, emphasizing their ability to gain unauthorized access and control over servers.

BEGINNER BUG BOUNTY TOOLS PART-1

BEGINNER BUG BOUNTY TOOLS PART 2

Identifying the device category using the Win32_Battery WMI class.

Things should do after sublister(sublist3r)